Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 50 matches
- 2006
- Hidenao Abe, Takahira Yamaguchi:
A Constructive Meta-Level Feature Selection Method based on Method Repositories. J. Comput. 1(3): 20-26 (2006) - Argyris Arnellos, Spyros Vosinakis, Thomas Spyrou, John Darzentas:
The Emergence of Autonomous Representations in Artificial Agents. J. Comput. 1(6): 29-36 (2006) - Bruno Bouchard, Sylvain Giroux, Abdenour Bouzouane:
A Smart Home Agent for Plan Recognition of Cognitively-impaired Patients. J. Comput. 1(5): 53-62 (2006) - Dirceu Cavendish:
Multimedia Home Ethernets. J. Comput. 1(5): 9-19 (2006) - Yi-Chen Chen:
On Maximum-Likelihood Detection for Non-coherent FH/BFSK in Multitone Jamming. J. Comput. 1(5): 1-8 (2006) - Min Chen, Taekyoung Kwon, Yong Yuan, Victor C. M. Leung:
Mobile Agent Based Wireless Sensor Networks. J. Comput. 1(1): 14-21 (2006) - Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin (Ben) He:
Symmetric Active/Active High Availability for High-Performance Computing System Services. J. Comput. 1(8): 43-54 (2006) - Christina E. Evangelou, Nikos I. Karacapilidis, Manolis Tzagarakis:
On the Development of Knowledge Management Services for Collaborative Decision Making. J. Comput. 1(6): 19-28 (2006) - Davrondzhon Gafurov, Kirsi Helkala, Torkjel Søndrol:
Biometric Gait Authentication Using Accelerometer Sensor. J. Comput. 1(7): 51-59 (2006) - José Daniel García, Jesús Carretero, Félix García Carballeira, Javier Fernández, David E. Singh, Alejandro Calderón:
Reliable Partial Replication of Contents in Web Clusters: Getting Storage without losing Reliability. J. Comput. 1(7): 81-88 (2006) - Jiangling Guo, Sunanda Mitra, Brian Nutter, Tanja Karp:
Backward Coding of Wavelet Trees with Fine-grained Bitrate Control. J. Comput. 1(4): 1-7 (2006) - JungHoon Ha, Jianying Zhou, Sang-Jae Moon:
Improved Double Auction Protocol based on a Hybrid Trust Model. J. Comput. 1(2): 33-41 (2006) - Brahim Hamid, Mohamed Mosbah:
A Local Enumeration Protocol in Spite of Corrupted Data. J. Comput. 1(7): 9-20 (2006) - Yu Hirate, Hayato Yamana:
Generalized Sequential Pattern Mining with Item Intervals. J. Comput. 1(3): 51-60 (2006) - David M. Horan, Richard A. Guinee:
A Novel Pulse Echo Correlation Tool for Transmission Path Testing and Fault Diagnosis. J. Comput. 1(1): 31-39 (2006) - Sung-eok Jeon:
Concurrent Failures and Redundant Protection Problem in Hierarchical GMPLS Networks. J. Comput. 1(2): 1-7 (2006) - Yoshio Kakizaki, Hiroshi Yamamoto, Hidekazu Tsuji:
A Method of An Anonymous Authentication For Flat-rate Service. J. Comput. 1(8): 36-42 (2006) - Anushiya A. Kannan, Guoqiang Mao, Branka Vucetic:
Simulated Annealing based Wireless Sensor Network Localization. J. Comput. 1(2): 15-22 (2006) - Sotiris B. Kotsiantis, Dimitris Kanellopoulos, Panayiotis E. Pintelas:
Local Boosting of Decision Stumps for Regression and Classification Problems. J. Comput. 1(4): 30-37 (2006) - Asma Ben Letaifa, Sami Tabbane, Zièd Choukair:
A Service Oriented Framework for Multimedia Radio Networks. J. Comput. 1(1): 48-55 (2006) - Chuanjun Li, B. Prabhakaran:
Indexing of Motion Capture Data for Efficient and Fast Similarity Search. J. Comput. 1(3): 35-42 (2006) - Chichao Lu, WenYuan Jen, Weiping Chang, Shihchieh Chou:
Cybercrime & Cybercriminals: An Overview of the Taiwan Experience. J. Comput. 1(6): 11-18 (2006) - Dimitris Magos, Ioannis Mourtos, Leonidas S. Pitsoulis:
The Matching Predicate and a Filtering Scheme Based on Matroids. J. Comput. 1(6): 37-42 (2006) - Yu Meng, Margaret H. Dunham:
Mining Developing Trends of Dynamic Spatiotemporal Data Streams. J. Comput. 1(3): 43-50 (2006) - Marianne Morris, Russell Greiner, Jörg Sander, Albert Murtha, Mark Schmidt:
Learning a Classification-based Glioma Growth Model Using MRI Data. J. Comput. 1(7): 21-31 (2006) - Akiko Orita:
Online Mutual Aid, "RAQ": A Study of Anonymous and Traceable Interactions. J. Comput. 1(8): 55-60 (2006) - Åke Östmark, Jens Eliasson, Per Lindgren, Aart van Halteren, Lianne Meppelink:
An Infrastructure for Service Oriented Sensor Networks. J. Comput. 1(5): 20-29 (2006) - Tuan Phan, Zhijun He, Thu D. Nguyen:
Using Firewalls to Enforce Enterprise-wide Policies over Standard Client-Server Interactions. J. Comput. 1(1): 1-13 (2006) - Mahalingam Ramkumar:
Broadcast Encryption Using Probabilistic Key Distribution and Applications. J. Comput. 1(3): 1-12 (2006) - Stephan Rein, Clemens Gühmann, Frank H. P. Fitzek:
Compression of Short Text on Embedded Systems. J. Comput. 1(6): 1-10 (2006)
skipping 20 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-06 08:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint